security beyond borders working above capability · flipkart internet pvt ltd 1) 3) 2) 4) 1520 hrs...

8

Upload: others

Post on 04-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SECURITY BEYOND BORDERS WORKING ABOVE CAPABILITY · Flipkart Internet Pvt Ltd 1) 3) 2) 4) 1520 hrs Afternoon Tea Networking Break 1550 hrs The Black Swan in the End to End Supply
Page 2: SECURITY BEYOND BORDERS WORKING ABOVE CAPABILITY · Flipkart Internet Pvt Ltd 1) 3) 2) 4) 1520 hrs Afternoon Tea Networking Break 1550 hrs The Black Swan in the End to End Supply

SECURITY BEYOND BORDERSWORKING ABOVE

CAPABILITY &CAPACITY

The CIISCM Conference series is making its wave into INDIA. A prestigious initiative specially crafted to encompass an all inclusive security agenda befitting security professionals who

are questing for knowledge, searching for competency and chasing for relevance in the fraternity and industry. If you fit this attributes and passion then the CIISCM Conferences at Mumbai, India is a sure MUST for you.

The CIISCM signature conference is where practitioners gather to encapsulate and expound strategic tactics, debate latest trends and challenges, share experiences, explore innovative ideas and acquire the latest in security professionalism. An invigorating agenda is promised to spark a new rebalancing into the thinking of the very way Security must take towards 2020 and beyond so that the challenges, obstacles and threats are appropriately harnessed and eradicated with firm commitment and assurance to the management that security DELIVERS into the business case as a definite asset rather than a liability.

As the conference theme prescribes, Security works beyond its parameters, scope and limits. Today, we are involved in almost every aspect of the business. Security has an influence and impact into the veins and nerves of our business operations. It is urgent and crucial that security professionals come forward and take onus of the responsibilities in front of them. Today, it is no more just managing MAN, MACHINE, METHODs or GUNS, GUARDS and GATES. We cannot remain glued to these generics and fundamentals. We are now championing emergency planning, crisis management, business continuity, crime prevention, anti terror threats, supply chain security, disgruntle employees, crime scene management-preservation-investigation, cyber security, IT security and the list goes on and on. We are working, up and above our capabilities and capacity. This is the new norm of today’s security professional, either you are there blended with the right skill sets or merged into the business and sidelined by other facets of the organization.

Thus, be it that CIISCM aspires to keep you relevant, current and informative with competencies, expertise and knowledge that moves our capabilities and capacities to the next notch. The CIISCM conference is precisely crafted to shape security professionals in the industry as business enablers and business enhancers. We can buy ourselves a seat on the board of our respective organization if we indulge ourselves to operate beyond our borders. We need to strive to widen our management capacities and broaden our professional capabilities to bring security into every facet of the business. This makes us a valued expert with an essential position in the business. This is the road we wish to walk, not alone but with YOU leading Security beyond its borders equipped with the precise capabilities and expertise.

www.CIISCM.org Email: [email protected]

Page 3: SECURITY BEYOND BORDERS WORKING ABOVE CAPABILITY · Flipkart Internet Pvt Ltd 1) 3) 2) 4) 1520 hrs Afternoon Tea Networking Break 1550 hrs The Black Swan in the End to End Supply

The View from the TOP: Security inside the Business Decision

Mr. Madhavan Menon Chairman & Managing DirectorThomas Cook India Limited

“A good reputation is invaluable and is hard to gain but twice as easy to lose”. Yet Security with minimal cost, maximum delivery, minimal hindrance to business and optimum customer satisfaction are the buzz words at the top. The risk appetite is big, acceptance and tolerance of threat and risk is a business gamble. The speaker unveils the view from the top and explains the top down and across commitment towards mitigating threat and risk. Is security a business priority or is it last in the list of concern and priorities? What is being done and where is the wind of change?

CONFERENCE PROGRAME16 December 2016

0830 hrs Registration & Morning Coffee Networking

0900 hrs Welcoming AddressMr. Tony LuggPresident, CIISCM

0910 hrs

1000 hrs Morning Coffee Networking Break

1030 hrs Recognizing the Transnational Terror Threat Effects and Harnessing the Terror Signals & Signs

Dr. Jolene JerardResearch Fellow and Manager (Capacity Building)International Centre for Political Violence and Terrorism ResearchS. Rajaratnam School of International Studies, Singapore

The terror threats are obviously capitalising on the surprise elements, planned towards massive destruction, attracting huge negative sensation. Recognizing the signs and signals of the unprecedented surprise attack from terrorist is imminent for security professionals. This presentation will see the subject matter expert unfolding transnational terror threats, the elements of terror group in the regions, the modus operandi of recent attacks and the terrorist mindset. The speaker will provide an overview of the how to and what to do towards understanding and harnessing terrorism threats.

www.CIISCM.org Email: [email protected]

Page 4: SECURITY BEYOND BORDERS WORKING ABOVE CAPABILITY · Flipkart Internet Pvt Ltd 1) 3) 2) 4) 1520 hrs Afternoon Tea Networking Break 1550 hrs The Black Swan in the End to End Supply

CONFERENCE PROGRAME16 December 2016

1115 hrs Detect The Insider Threat and Deter The External Challenge - Pushing The Capabilities and Capacities A Notch Up

Mr. Shirish Janardan Inamdar Security & VigillanceBharat Diamond Bourse

The lethal threat today is from one within our organization, one who works with and among us. Is the employee a terror group sympathiser? Is the person a disgruntle employee seeking revenge or perhaps radicalised? The insider can cause havoc. The individual can be from within a service industry, a supply chain facet or just by being among us all. Juxtapose to the internal threat is the looming voice of terror organizations and organised attacks. It is not just the law enforcement agencies which need innovative action plans, the security professionals need to acquire skill sets which will build up their capabilities and capacity to act and react appropriate to the threats and challenges today.

1145 hrs Panel Discussion Terror, Terrorism, Terrorist: “It will not happen to us” or Are we are simply ignoring the Fact?

Moderator: Mr. Munies PillaiSenior Vice PresidentCIISCM

Panelists:

1230 hrs Networking Lunch

www.CIISCM.org Email: [email protected]

The session will see the 4 keynote speakers of the morning session converging to debate and defend their presentation as panellist. The delegates will take the opportunity to express their opinion and seek explanations to their doubts and questions. The moderator of the session will drive the discussion towards a synchronicity of the topics unveiled earlier in the day and conclude a summary of the agenda for the delegates partaking.

Mr. Madhavan Menon Chairman & Managing DirectorThomas Cook India Limited

Mr. Shirish Janardan Inamdar Security & VigillanceBharat Diamond Bourse

Dr. Jolene JerardResearch Fellow and Manager (Capacity Building), ICPVTRS. Rajaratnam School of International Studies, Singapore

1)

3)

2)

Page 5: SECURITY BEYOND BORDERS WORKING ABOVE CAPABILITY · Flipkart Internet Pvt Ltd 1) 3) 2) 4) 1520 hrs Afternoon Tea Networking Break 1550 hrs The Black Swan in the End to End Supply

The New Norm of Security Professionals

Mr. Sanjay KaushikManaging DirectorNetrika Consulting India Pvt Ltd

The presentation will expound on the reality as it is of the security practitioners today and how they are glued to the effects of 3M and 3G. The demand today is beyond the traditional borders which are niche only on the responsibilities of detection, correction and prevention. The new norm is for security professionals to assimilate a vast spectrum of roles which work in correlations to the business demands. We need to push ourselves into being a business enhancer and business enabler. Any consideration lesser makes us redundant or obsolete.

1400 hrs

CONFERENCE PROGRAME16 December 2016

1330 hrs

www.CIISCM.org Email: [email protected]

Preparedness, Leadership, Communication, Decision and Practise in handling a Crisis – Bringing Perception to Reality in Terrorist Attacks

Mr. Gerard LeeAssociate Practicing Management Consultant (APMC)Singapore Business Advisors and Consultant Council (SBACC)Explosive Ordnance Disposal Technician (EOD)Singapore Armed Forces

The accurate, precise and well planned handling and execution during a crisis is paramount to the brand, goodwill, prestige and image of the organization. This presentation will take a deep dive into the preparedness and constant drills and practices required to handle a terror attack. What can go Wrong and what must be Right is vital. The organization needs the right expert to plan and execute the directions and actions towards an effective and strategic management of an unprecedented event. The speaker unfolds the relevancy of experience, expertise and competency in the making of a maestro who orientates the finest orchestra in such a crisis situation.

Crisis Simulation Exercise

Mr. Suraj ShankhpalExecutive DirectorGoldman Sachs

Gain the knowledge, competency and experience in dealing with a crisis. An incident may lead to a crisis and eventually even to a disaster. The business needs to survive and yet must continue to perform. It does but in a new norm. Experience the simulated ‘close to real” case scenario Table Top Exercise (TTX) on crisis management. The moderator engages you towards the right and precise actions and reactions which will dwell into the strategic, operational and tactical decisions which need to be made with minimal disruption, panic or lost in time during a crisis. What needs to be done by whom? How and what to inform the management? What is the escalation process and procedure?

1440 hrs

Page 6: SECURITY BEYOND BORDERS WORKING ABOVE CAPABILITY · Flipkart Internet Pvt Ltd 1) 3) 2) 4) 1520 hrs Afternoon Tea Networking Break 1550 hrs The Black Swan in the End to End Supply

CONFERENCE PROGRAME16 December 2016

1700 hrs Appreciation Presentation & Closing SpeechMr. Tony LuggPresident, CIISCM

1620 hrs Panel Discussion The Terror Expectation and Counter Response Today: Globally and in India

Moderator: Mr. Munies PillaiSenior Vice PresidentCIISCM

Panelists:

The session will see the 4 keynote experts converging to debate on the terrorism climate in India. The delegates will take the opportunity to express their opinion and seek explanations to the expectations and responses in the country. The moderator of the session will drive the discussion towards a synchronicity of the topics unveiled earlier in the day and conclude a summary of the agenda for the delegates and panellist to deliberate.

Mr. Sanjay KaushikManaging DirectorNetrika Consulting India Pvt Ltd

Mr. Suraj ShankhpalExecutive DirectorGoldman Sachs

Mr. Gerard LeeExplosive Ordnance Disposal Technician (EOD)Singapore Armed Forces

Mr. Gaurav K DattaaSenior Director – Corporate Investigations, Security & SafetyFlipkart Internet Pvt Ltd

1)

3)

2)

4)

1520 hrs Afternoon Tea Networking Break

1550 hrs The Black Swan in the End to End Supply Chain

Mr. Gaurav K DattaaSenior Director – Corporate Investigations, Security & SafetyFlipkart Internet Pvt Ltd

The “Black Swan” effect is the constant threat throughout the veins and nerves of the Supply Chain. The unprecedented events, in the form of natural disasters, IT hacking and cyber threats, business crisis, pandemics and insider threats are escalated today. Predictability is becoming harassment to the security professionals. Terror groups and organised crime are also paralysing the smooth functionalities of the end to end supply chain. Yet, many are the “What Ifs” in Supply Chain. This presentation explores the facets which challenges the supply chain and how security must be adequately equipped with the precise expertise and knowledge to face off the threats and ensure a safe and secured end to end supply chain.

Page 7: SECURITY BEYOND BORDERS WORKING ABOVE CAPABILITY · Flipkart Internet Pvt Ltd 1) 3) 2) 4) 1520 hrs Afternoon Tea Networking Break 1550 hrs The Black Swan in the End to End Supply

Organised By: Co-Managed By:

For Enquiries On Conference Registration and Sponsorship,You May Contact Our Appointed Conference Managers.

NETRIKA CONSULTING INDIA PVT LTDMs. Suruchi Gaur

Plot #353, Vijay Vihar, Sector 30, Behind Star Mall NH-8, Gurgaon - 122002, Haryana, IndiaTel: +91 124 2883000 / +91 9910020032 Email: [email protected]

GLOBAL E2C PTE LTDMr. Baalachandra Naidu

25 Bukit Batok Crescent, The Elitist #04-02, Singapore 658066Tel: +65 66844687 Email: [email protected]

FEE & REGISTRATION

CIISCM Full Membership Members

CIISCM Subscriber Membership Members

Supporting Organisation’s Members

Regular Ticket

T1

T2

T3

T4

Rs. 6,700

Rs. 12,700

Rs. 13,400

Rs. 16,000

Join CIISCM Full Membership + ConferenceT5 Rs. 19,700

Page 8: SECURITY BEYOND BORDERS WORKING ABOVE CAPABILITY · Flipkart Internet Pvt Ltd 1) 3) 2) 4) 1520 hrs Afternoon Tea Networking Break 1550 hrs The Black Swan in the End to End Supply